they sure aren’t disproving how woke they are
Why do you think that they need to be doing this?
they sure aren’t disproving how woke they are
Why do you think that they need to be doing this?
I used Ubuntu from version 8.04 to 18.04 and not once did I have a successful upgrade between major versions. There is always something that gets broken to the point that a reinstall is necessary.
Can't wait to read about it telling someone to put glue on pizza.
I love that the local translation feature is getting regular small updates to make it more useable. It's a great feature.
This is huge news. Great work to the contributors involved in making this happen.
As soon as Linus starts talking about something that you actually know about, you realise that he is bullshitting you, and it immediately calls into question everything that you've heard him say about subjects that you're not an expert in.
I had this realization about LTT years ago, but it's a known phenomenon in journalism (the Gell-Mann amnesia effect) and seems to be even more common in YouTube journalism since the barrier to entry of publishing video is so much lower than publishing in print.
The key thing to know is that a client can do an HTTP HEAD
request to get just the Content-Length
of the file, and then perform GET
requests with the Range
request header to fetch a specific chunk of a file.
This mechanism was introduced in HTTP 1.1 (byte-serving).
Tencent Games strategic advisor Shawn Layden ...
Non-endemic companies such as Google and Amazon are among the biggest threats to the games industry.
That's according to former PlayStation boss Shawn Layden, who shared his thoughts on the future of games during the keynote at last week's GamesIndustry.biz Investment Summit in Seattle.
The irony is palpable throughout this entire article.
Yeah. RISC is good.
The man's a legend, but not without recent controversy:
There's something important missing from this article:
Why is an airgapped machine running executable code from a USB drive? Is there some OS-level vulnerability being exploited?
The original writeup says the following:
So we have airgapped machines that rely on users to click icons in a graphical file manager to move data from USB drives. This is a complete failure of security procedure. If you have systems that need to be airgapped then you also need the corresponding procedures for use of those systems to prevent this kind of compromise.